Tenable.sc Patch 202104.1 Release Notes (2021-04-05)
Tip: Tenable rebranded SecurityCenter as Tenable.sc. For more information, see the announcement.
Note: This release includes a fix for a potential vulnerability. For more information, see the Tenable Product Security Advisory.
Apply this patch to Tenable.sc installations running the following versions:
-
Tenable.sc 5.16.0 (CentOS 7 or RHEL 7 only)
-
Tenable.sc 5.17.0 (CentOS 7, RHEL 7, CentOS 8, or RHEL 8)
This patch updates OpenSSL 1.1.1j to OpenSSL 1.1.1k to address CVE-2021-3449.
Steps to Apply
Apply the patch to a standalone Tenable.sc or Tenable Core + Tenable.sc:
- Download the patch from https://www.tenable.com/downloads/tenable-sc to Tenable.sc. You can save the files in any location (e.g., /tmp).
-
Access the command line as a user with root-level permissions.
-
Run the following command to untar the patch file:
tar zxf SC-202104.1-5.x.tgz
-
Run the following command to change the directory to the extracted directory:
cd directory
-
Run the following command to begin the installation:
sh ./install.sh
The installation begins and Tenable.sc is stopped. After the installation finishes, Tenable.sc automatically restarts.
What to do next:
-
(Optional) Confirm the patch successfully applied to Tenable.sc, as described in the knowledge base article.
Contents
-
lib/libcrypto.so.1.1
-
lib/libssl.so.1.1
-
bin/openssl
Filenames and Checksums
Filenames and MD5 or SHA-256 checksums are located on the Tenable.sc Downloads page.